Such software could determine, for example, the time or other circumstances under which particular devices encrypt particular content via a particular encryption scheme, thereby limiting theexposure of that particular content to unauthorized tampering.CPU-based "smart controller devices may, however, elect to utilize a higher-level interface (in addition to raw interface 2020) for most aspects of